-
1
-
-
3042583499
-
Secure Group Communication Using Robust Contributory Key Agreement
-
May
-
Y. Amir, Y. Kim, C. Nita-Rotaru, J. L. Schultz, J. Stan and G. Tsudik, "Secure Group Communication Using Robust Contributory Key Agreement," IEEE Transactions on Parallel and Distributed Systems, pp. 468-480, May 2004.
-
(2004)
IEEE Transactions on Parallel and Distributed Systems
, pp. 468-480
-
-
Amir, Y.1
Kim, Y.2
Nita-Rotaru, C.3
Schultz, J.L.4
Stan, J.5
Tsudik, G.6
-
2
-
-
0242414397
-
Key Management Approaches to Offer Data Confidentiality for Secure Multicast
-
October
-
K.-C. Chan and S.-H. Chan, "Key Management Approaches to Offer Data Confidentiality for Secure Multicast," IEEE Network, pp. 30-39, October 2003.
-
(2003)
IEEE Network
, pp. 30-39
-
-
Chan, K.-C.1
Chan, S.-H.2
-
3
-
-
1642635188
-
An Efficient Session Key Generation Protocol
-
Beijing, China, pp, April 9-11
-
C.-C. Chang and C.-Y. Chung, "An Efficient Session Key Generation Protocol," Proceedings of the 2003 IEEE International Conference on Communication Technology, Beijing, China, pp. 203-207, April 9-11, 2003.
-
(2003)
Proceedings of the 2003 IEEE International Conference on Communication Technology
, pp. 203-207
-
-
Chang, C.-C.1
Chung, C.-Y.2
-
4
-
-
84943265930
-
Group Keys and the Multicast Security in Ad Hoc Networks
-
Kaohsiung, Taiwan,ROC, pp, October 6-9
-
T.-C. Chiang and Y.-M. Huang, "Group Keys and the Multicast Security in Ad Hoc Networks," Proceedings of the 2003 IEEE International Conference on Parallel Processing Workshops, Kaohsiung, Taiwan,ROC, pp. 385-290, October 6-9, 2003.
-
(2003)
Proceedings of the 2003 IEEE International Conference on Parallel Processing Workshops
, pp. 385-290
-
-
Chiang, T.-C.1
Huang, Y.-M.2
-
5
-
-
21644478900
-
Secure Multicast Model for Ad-Hoc Military Networks
-
Singapore, pp, November 16-19
-
M. Choudhary, P. Sharma, and D. Sanghi, "Secure Multicast Model for Ad-Hoc Military Networks," Proceedings of the 12th IEEE International Conference on Networks, Singapore, pp. 683-688, November 16-19, 2004.
-
(2004)
Proceedings of the 12th IEEE International Conference on Networks
, pp. 683-688
-
-
Choudhary, M.1
Sharma, P.2
Sanghi, D.3
-
6
-
-
27644528961
-
Weight Based Adaptive Clustering in Wireless Ad Hoc Networks
-
New Delhi, India, pp, January 23-25
-
S. K. Dhurandher and G. V. Singh, "Weight Based Adaptive Clustering in Wireless Ad Hoc Networks," Proceedings of the 2005 IEEE International Conference on Personal Wireless Communications, New Delhi, India, pp. 95-100, January 23-25, 2005.
-
(2005)
Proceedings of the 2005 IEEE International Conference on Personal Wireless Communications
, pp. 95-100
-
-
Dhurandher, S.K.1
Singh, G.V.2
-
7
-
-
54349093602
-
Weight-Based Clustering Multicast Routing Protocol for Mobile Ad Hoc Networks
-
New Orleans, Louisiana, USA, pp, March 16-20
-
C.-C. Huang, R.-S. Chang, and M.-H. Guo, "Weight-Based Clustering Multicast Routing Protocol for Mobile Ad Hoc Networks," Proceedings of the IEEE Conference on Wireless Communications and Networking, New Orleans, Louisiana, USA, pp. 1112-1117, March 16-20, 2003.
-
(2003)
Proceedings of the IEEE Conference on Wireless Communications and Networking
, pp. 1112-1117
-
-
Huang, C.-C.1
Chang, R.-S.2
Guo, M.-H.3
-
8
-
-
0002703004
-
Mobile Ad Hoc Networking and the IETF
-
January
-
J. P. Macker and M. S. Corson, "Mobile Ad Hoc Networking and the IETF," ACM SIGMOBILE Mobile Computing and Communications Reviews, Vol. 2, No. 2, pp. 9-14, January 1998.
-
(1998)
ACM SIGMOBILE Mobile Computing and Communications Reviews
, vol.2
, Issue.2
, pp. 9-14
-
-
Macker, J.P.1
Corson, M.S.2
-
9
-
-
84904888755
-
Attack DDoS at the Source
-
Paris, France, pp, November 12-15
-
J. Mirkovic, G. Prier, and P. Reiher, "Attack DDoS at the Source," Proceedings of the 2002 IEEE International Conference on Network Protocol, Paris, France, pp. 312-321, November 12-15, 2002.
-
(2002)
Proceedings of the 2002 IEEE International Conference on Network Protocol
, pp. 312-321
-
-
Mirkovic, J.1
Prier, G.2
Reiher, P.3
-
11
-
-
0029720059
-
Diffie-Hellman Key Distribution Extended to Group Communication
-
New Delhi, India, pp, March
-
M. Steiner, G. Tsudik, and M. Waidner, "Diffie-Hellman Key Distribution Extended to Group Communication," Proceedings of the Third ACM Conference on Computer and Communications Security, New Delhi, India, pp. 31-37, March 1996.
-
(1996)
Proceedings of the Third ACM Conference on Computer and Communications Security
, pp. 31-37
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
12
-
-
0031629148
-
CLIQUES: A New Approach to Group Key Agreement
-
Amsterdam, Netherlands, pp, May 26-29
-
M. Steiner, G. Tsudik, and M. Waidner, "CLIQUES: A New Approach to Group Key Agreement," Proceedings of the 18th IEEE International Conference on Distributed Computing System, Amsterdam, Netherlands, pp. 380-387, May 26-29, 1998.
-
(1998)
Proceedings of the 18th IEEE International Conference on Distributed Computing System
, pp. 380-387
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
13
-
-
34547815211
-
A Secure Group Communication Protocol for Ad Hoc Wireless Networks
-
Springer
-
Y.-M. Tseng, C.-C. Yang, and D.-R. Liao, "A Secure Group Communication Protocol for Ad Hoc Wireless Networks," Advances in Wireless Ad Hoc and Sensor Networks, Book Series "Signals and Communication Technology," Springer, 2007.
-
(2007)
Advances in Wireless Ad Hoc and Sensor Networks, Book Series Signals and Communication Technology
-
-
Tseng, Y.-M.1
Yang, C.-C.2
Liao, D.-R.3
-
14
-
-
84964478812
-
Security Management in Hierarchical Ad Hoc Network
-
ICII, Beijing, China, pp, October
-
P. Yang and S. Zheng, "Security Management in Hierarchical Ad Hoc Network," Proceedings of the 2001 International Conferences on Info-tech and Info-net (ICII), Beijing, China, pp. 642-649, October 2001.
-
(2001)
Proceedings of the 2001 International Conferences on Info-tech and Info-net
, pp. 642-649
-
-
Yang, P.1
Zheng, S.2
|